Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners

被引:10
|
作者
Canedo, Edna Dias [1 ]
Bandeira, Ian Nery [1 ]
Seidel Calazans, Angelica Toffano [2 ]
Teixeira Costa, Pedro Henrique [1 ]
Rodrigues Cancado, Emille Catarine [1 ]
Bonifacio, Rodrigo [1 ]
机构
[1] Univ Brasilia UnB, Dept Comp Sci, POB 4466, BR-70910900 Brasilia, DF, Brazil
[2] Univ Ctr UniCEUB, Brasilia, DF, Brazil
关键词
Privacy requirements elicitation; Systematic literature review; Methodologies; Techniques; Tools; SECURITY REQUIREMENTS;
D O I
10.1007/s00766-022-00382-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the software development process and throughout the software lifecycle, organizations must guarantee users' privacy by protecting personal data. There are several studies in the literature proposing methodologies, techniques, and tools for privacy requirements elicitation. These studies report that practitioners must use systematic approaches to specify these requirements during initial software development activities to avoid users' data privacy breaches. The main goal of this study is to identify which methodologies, techniques, and tools are used in privacy requirements elicitation in the literature. We have also investigated Information Technology (IT) practitioners' perceptions regarding the methodologies, techniques, and tools identified in the literature. We have carried out a systematic literature review (SLR) to identify the methodologies, techniques, and tools used for privacy requirements elicitation. Besides, we have surveyed IT practitioners to understand their perception of using these techniques and tools in the software development process. We have found several methodologies, techniques, and tools proposed in the literature to carry out privacy requirements elicitation. Out of 78 studies cataloged within the SLR, most of them did not verify their methodologies and techniques in a practical case study or illustrative contexts (38 studies), and less than 35% of them (26 studies) experimented with their propositions within an industry context. The Privacy Safeguard method (PriS) is the best known among the 198 practitioners in the industry who participated in the survey. Moreover, use cases and user story are their most-used techniques. This qualitative and quantitative study shows a perception of IT practitioners different from those presented in other research papers and suggests that methodologies, techniques, and tools play an important role in IT practitioners' perceptions about privacy requirements elicitation.
引用
收藏
页码:177 / 194
页数:18
相关论文
共 50 条
  • [31] Method for Privacy Requirements Elicitation in Ubiquitous Computing
    da Silva Junior, Deogenes P.
    de Souza, Patricia Cristiane
    Maciel, Cristiano
    SBES'18: PROCEEDINGS OF THE XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING, 2018, : 178 - 183
  • [32] Privacy of the Internet of Things: A Systematic Literature Review
    Aleisa, Noura
    Renaud, Karen
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 5947 - 5956
  • [33] Privacy in smart speakers: A systematic literature review
    Maccario, Guglielmo
    Naldi, Maurizio
    SECURITY AND PRIVACY, 2023, 6 (01):
  • [34] Consumer privacy in smartphones: a systematic literature review
    Unny, R. Balakrishnan
    Shome, Samik
    Shankar, Amit
    Pani, Saroj Kumar
    JOURNAL OF CONSUMER MARKETING, 2024, 41 (01) : 1 - 16
  • [35] Privacy and Cryptocurrencies-A Systematic Literature Review
    Herskind, Lasse
    Katsikouli, Panagiota
    Dragoni, Nicola
    IEEE ACCESS, 2020, 8 : 54044 - 54059
  • [36] Cultural influence on requirements engineering activities: a systematic literature review and analysis
    Alsanoosy, Tawfeeq
    Spichkova, Maria
    Harland, James
    REQUIREMENTS ENGINEERING, 2020, 25 (03) : 339 - 362
  • [37] Cultural influence on requirements engineering activities: a systematic literature review and analysis
    Tawfeeq Alsanoosy
    Maria Spichkova
    James Harland
    Requirements Engineering, 2020, 25 : 339 - 362
  • [38] Integration between requirements engineering and safety analysis: A systematic literature review
    Vilela, Jessyka
    Castro, Jaelson
    Martins, Luiz Eduardo G.
    Gorschek, Tony
    JOURNAL OF SYSTEMS AND SOFTWARE, 2017, 125 : 68 - 92
  • [39] Computer-Aided Privacy Requirements Elicitation Technique
    Miyazaki, Seiya
    Mead, Nancy
    Zhan, Justin
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 367 - +
  • [40] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159